Close

Cyberthugs Have Made $4 Million So Far in Email Sextrotion

Not every internet scam needs sophisticated software to put into action. In fact, one of the most successful ones going on right now is incredibly simple in operation, while being quite sophisticated in its psychological tactics. It is the psychology of it that gets people to send the scammers money. The concept of the latest scam is simple. The scammers send emails to potential targets telling t...

Keep Reading

Canadian Data Breaches: Changes to the Laws Occurred on November 1st, 2018

Many business owners don’t realize that new laws are in place surrounding data breaches. On November 1st, 2018, these new laws went into effect for all Canadian business owners. These laws will affect thousands of businesses now, so it’s essential for all business owners to be aware of the changes and be prepared to comply. If these laws are not followed, businesses could be fined up to $100...

Keep Reading

Is Your 2019 Business Technology Plan Completed?

The new year is already upon us, but it is not too late to put together a solid, sensible information technology plan for 2019. Strategic planning in all areas of operation—including technology—helps organizations budget for and efficiently manage day-to-day requirements while investing in long-term projects and solutions. As your business evolves, so will it’s IT requirements. Likewise, ...

Keep Reading

10 Tips To Guard Against SamSam Ransomware

In July 2018, an article published by Naked Security stated that SamSam, one of the latest ransomware threats, has been one of the most costly and dangerous attacks in history. SamSam leeched at least $6 million from unwitting victims, some of which were well-known businesses and government operations. SamSam ended up costing the Colorado Department of Transportation upwards of $1.5 million a...

Keep Reading

Why Business Must Have A Security Focused IT Consulting Company

When you are choosing the best IT consulting for your business, it is critical that you find a company that is extremely focused on all of the elements of security that can be a threat. Many of the best IT consulting companies go the extra mile for their clients by acting as a Managed Security Services Provider (MSSP), which allows all aspects of consultation to involve attention to security detai...

Keep Reading

6.8M Facebook Users Hit By New Photo Bug

Facebook has just announced that a Photo API bug gave app developers access to user photos outside of the scope intended for 5.6 million users. This includes granting apps access to Facebook Stories, Marketplace photos, and photos that were uploaded but not shared. The bug was in effect from September 13th to September 25th. As of now, Facebook is working on releasing tools to allow app developer...

Keep Reading

Top 5 Cybersecurity Predictions For 2019

Cyber threats are a genuine danger for businesses, no matter their size or industry. Companies that face data breaches are likely to fail within months after the attack, according to the National Cyber Security Alliance. Security issues can ruin your reputation and cause expensive damage to your company. In 2019, we are already predicting increased cyber crimes to steal more data and resources. T...

Keep Reading

Employee Benefits & Cyber Attacks (Questions/Answers)

Your employees may understand that they risk identity theft every time there’s a major cyber breach at a store they’ve patronized. But do they know that even more of their personal information is available to hackers via their employee benefits plans? It’s a risk that an increasing number of business owners and CEOs have had to confront. How to safeguard employee data — and avoid the signi...

Keep Reading

Are Your Employees Your Largest Cybersecurity Risk?

Regardless of the money businesses invest in cybersecurity, technology is only part of the cybersecurity puzzle. Regardless of new hardware, updated software and the best IT support team, cybersecurity is an ongoing commitment. Cybersecurity must be on the minds of every employee every hour of every day. A Chain Is Only As Strong As Its Weakest Link. This idiom is attributed to Thomas Reid who ...

Keep Reading

Cape Cod Community College Hit With $800,000 Phishing Attack

Hackers Know How to Steal Money Anonymously In West Barnstable, Massachusetts, Cape Cod Community College recently fell victim to a phishing scam that resulted in the school losing more than $800,000. The money was taken out of the school’s bank accounts. While this kind of scam is common these days, there are measures a business can take to prevent it. In the case of Cape Cod Community College...

Keep Reading

Is Your Tech Firm Conducting Quarterly Technology Reviews?

No matter the line of business you’re in, outsourcing your IT services to a managed service provider (MSP) provides a world of benefits. Both your internal systems and your online presence will be optimized and streamlined, tech problems will be taken care of right away, and you’ll have more time to focus on what matters. Aside from providing excellent customer care and competency in their fi...

Keep Reading

A Quick Guide For Buying A New Home Computer

Looking for a new computer for your home office? Year-end sales and tax returns often lead to boosted sales in computers. But purchasing a new computer can feel overwhelming. The technology changes quickly and the jargon can be confusing. Here is an explanation of what you want to consider when looking at getting a new home computer. Central Processing Unit: The faster the CPU (central processin...

Keep Reading